Some contributions to the management of data in grids Lionel Brunie National Institute of Applied Science (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS.

Slides:



Advertisements
Similar presentations
Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
Advertisements

Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
V-GISC Presentation – ET_WISC – Geneva - February v-GISC key functionalities ET_WISC meeting 2-5 February 2010 Jean-Pierre Aubagnac, Jacques Roumilhac.
FP7-INFRA Enabling Grids for E-sciencE EGEE Induction Grid training for users, Institute of Physics Belgrade, Serbia Sep. 19, 2008.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
Arrow color indicates specific subset of Security Service Desk Common Backplane API. is DC Backplane API impledmented by the Backplane Services. Devices.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
1 Hector DUQUE, Creatis/LIRIS Johan MONTAGNAT, Creatis Jean-Marc PIERSON, LIRIS.
Pervasive Computing Framework development Kartik Vishwanath Arvind S. Gautam Rahul Gupta Sachin Singh.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
PhD course - Milan, March /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Master Course /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
SensIT PI Meeting, April 17-20, Distributed Services for Self-Organizing Sensor Networks Alvin S. Lim Computer Science and Software Engineering.
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
Client-Server Computing in Mobile Environments
MobiSteer: Using Steerable Beam Directional Antenna for Vehicular Network Access Vishnu Navda, Anand Prabhu Subramanian, Kannon Dhanasekaran, Andreas Timm-Giel,
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Grid Toolkits Globus, Condor, BOINC, Xgrid Young Suk Moon.
PhD course - Milan, March /09/ Some additional words about cloud computing Lionel Brunie National Institute of Applied Science (INSA) LIRIS.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000.
1 School of Computer, National University of Defense Technology A Profile on the Grid Data Engine (GridDaEn) Xiao Nong
UMR 5205 An Introduction to Ubiquitous and Pervasive Computing Lionel Brunie National Institute of Applied Sciences (INSA) LIRIS Laboratory/DRIM Team –
Un peu de recherche…. 2 LIRIS/DCS/DRIM 3 Nostalgia: an overview of the past 10 years Some contributions to the management of data in grids Some contributions.
Publication and Protection of Site Sensitive Information in Grids Shreyas Cholia NERSC Division, Lawrence Berkeley Lab Open Source Grid.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
Martin-1 CSE 5810 CSE 5810 Individual Research Project: Integration of Named Data Networking for Improved Healthcare Data Handling Robert Martin Computer.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
A Peer-to-Peer Approach to Resource Discovery in Grid Environments (in HPDC’02, by U of Chicago) Gisik Kwon Nov. 18, 2002.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
NGCWE Expert Group EU-ESA Experts Group's vision Prof. Juan Quemada NGCWE Expert Group IST Call 5 Preparatory Workshop on CWEs 13th.
Web Caching and Replication Presented by Bhushan Sonawane.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
MEDIGRID project, DataGrid FR meeting, April 18, 2002, Johan Montagnat, WP10 ACI GRID 2002 MEDIGRID: high performance medical image processing on a computational.
Security March 9, Security What is security?  Techniques that control access to use a shared resource  Uses of shared resource must be authorized.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
WP 10 ATF meeting April 8, 2002 Data Management and security requirements of biomedical applications Johan Montagnat - WP10.
Diego R. Lopez, RedIRIS JRES2005, Marseille On eduGAIN and the Coming GÉANT Middleware Infrastructure.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
UMR 5205 Grilles de données : vers une grille pervasive ? Lionel Brunie National Institute of Applied Sciences (INSA) LIRIS Laboratory/DRIM Team – UMR.
Computer Science and Engineering 1 Mobile Computing and Security.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Gaia An Infrastructure for Active Spaces Prof. Klara Nahrstedt Prof. David Kriegman Prof. Dennis Mickunas
ICN based Architecture for IoT ICNRG/IETF 88, 2013 Yanyong Zhang, Dipankar Raychadhuri Rutgers University) Ravi Ravindran and Guo-Qiang Wang.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Revision HistoryFirst Draft, November 19-20, 2014 Revision 1, December 9-10, 2014 Revision 2, December.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Presented by Edith Ngai MPhil Term 3 Presentation
High Performance Computing Lab.
Security Requirements for ChinaGrid Applications - What the current grid security solutions cannot do Hai Jin Huazhong University of Science and Technology.
Security Issues.
Pervasive Data Access (PDA) Research Group
Dipanjan Chakraborty Anupam Joshi CSEE University of Maryland Baltimore County Anamika: Distributed Service Discovery and Composition Architecture for.
A (no-)conclusion ? Lionel Brunie
Presentation transcript:

Some contributions to the management of data in grids Lionel Brunie National Institute of Applied Science (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS 5205 Lyon, France

2 NDS : Network Distance Service

3 Grid access control: Sygn Mechanisms for delegation of rights File group operations Permission = Authorization Certificate (AC) : – Issuer – Owner – Capability (access control object + authorized action) – Validity – Signature

4 4 Encrypted storage for Data Grids: Crypstore

5 Management of a Cooperative Cache in Grids cache organization GRID data organization data Collective Coordinator Monitoring operations data description processed requests transfers replacements used storage resource Etc. Management operations Set replacement method Set default time to live Set cache group Set cache coordinator Set collective work mode Etc.

6 Data integration

7 Some contributions to Pervasive/Ubiquitous Systems

8 PerSE Adaptation context Models Context-awareness Proactivity Service composition

9 Architecture of a PerSE Base

10 PerSE Layers

11 Context modeling and Context-aware pervasive applications Context = ? User/Application centric Context Context-aware application platform

12 Access Control for mobile users Chains of trust certificates: if A trusts B and B trusts C then A trusts C… to some level Multi-layered adaptive certificates Trust computing and reputation

13 Authentication and Trust in pervasive systems

14 Mobile requests Information exchange between mobile peers (MANETs, VANETs) Trajectory aware geocast request routing Construction for each query of an ad hoc overlay of the peers that may participate to the delivery of the requested data

15 Data replication in small worlds Server Original content

16 Replication in ad hoc networks Issues: instability, dynamicity, faults/disconnections Basic idea: adapt the replication heuristics to the actual usage of the data, e.g.: –Data highly accessed => replicate –Rare data and planned disconnection => replicate –Overloaded peer => replicate most accessed data –Etc. Pre-requisite: access logging + exchange of access data Assumption: no central coordination – local decisions Question : can local decisions lead to an acceptable (good ?) situation ?

17 Interface adaptation and context-aware browsing of a patient medical record

18 Multimedia Content Adaptation + Adaptation of the interface wrt the end-user device Ongoing : Content Adaptation in MANETs

19 Semantic protection of multimedia data Multimedia => access control is not a binary decision Access control content adaptation Coherence/Consistence of an adaptation Legality of an adaptation => Access control = semantic adaptation decision

20 Semantic clustering of multimedia queries: From query logging to database content and user profile discovery Large number of data stores disseminated Lack of indexes Issues : –What are the pertinent/interesting data ? –What are the users interest ? –How to process a query ? Logging of the users’ queries + clustering + communication of clustering info => identification of the community of users’ interests Logging of a the queries issued by a specific user + matching to the community clustering => identification of the user’s profile Usage: query optimization, data store management, recommendation, social computing, etc.